Information Security / Network Security Manager

09 Feb 2025

Vacancy expired!

Summary A strong Security DRI is a critical element of any security program. Selecting the right DRI sets the tone, direction, and energy of the security program as a whole. This guidance will help you seek out better candidates based on our experience of building security leadership and programs across the Client’s global operations and environments.

CharacteristicsWe recommend evaluating your candidate based on the following 5 key characteristics Characteristic Adaptability Authority Cooperation Initiative

Technical

Explanation
  • They can think through problems and find obvious as well as uniquely simple solutions.
  • They have been given the appropriate authority to drive change and have used it humbly and responsibly.
  • They can work well with others both internally to the company and with client personnel.
  • They are proactive and can work to achievements without having to be directed. They have a sense of drive to keep doing great work.
  • They are experts, or willing to become an expert.

Functional Duties
  • Design, plan, implement and maintain security policies, procedures, and practices which provide protection for the facility, information, equipment and personnel in accordance with business and Client requirements.
  • Lead all aspects of the security function including: strategic planning, client interface, budget management, staffing, and leadership of all security operations.
  • Identify risks, research and deploy state-of-the-art technology solutions and innovative security management techniques.
  • Direct evaluation of existing security systems and programs, and implement new or improved projects and procedures to close any identified deficiencies or gaps.
  • Direct technical and information security activities including security education; document and material classification and control and records management. (May be an Information Technology function and individual performing duties.)
  • Direct Personnel Security Program, including pre-employment screenings, clearance processing and maintenance, visitor control, vendor security and internal investigations.
  • Ensure that budgets, schedules, and performance standards/requirements are set and attained.

Short Term Professional Services Description FYI. This supplier has a mixed environment of macOS and windows.

Cisco Creating network documentation (network diagrams, data flow diagrams, policies, procedures, configuration guides etc)Network Segmentation (Segment firewalls, switches, and routers from other non-Apple clients, Web filtering: URL specific)Setup and deploy TACACS server for directory based authentication for network admins

Qualys (Vulnerability Management)Setup and deployment of Qualys across entire vendor network (endpoint, servers & network devices)Creation of Vulnerability Management documentation (policies, procedures, configuration guides)Customize executive and detailed reports to meet customer requirement Configure credential/authenticated scans Create remediation program and processes to meet customer SLA

JAMFSetup and deployment of JAMF across entire vendor networkCreation MDM documentation (policies, procedures, configuration guides)Setup macOS security compliance project (mSCP)

Falcon Crowdstrike Support aligning environment with customer business and security requirements

SolarWinds - LoggingSupport aligning environment with customer business and security requirements

Elastic SOC - SIEMSupport aligning environment with customer business and security requirements

OKTA - MFASupport aligning environment with customer business and security requirements

Short Term Professional Services Duration:

Cisco Networking Support6 and 12 months quotes for troubleshooting, maintenance, supportAlign Cisco environment with customer business and security requirements

Qualys Networking Support6 and 12 months quotes for deployment of new agents, setup and management of scans, remediation of vulnerabilities, documentation maintenanceAlign Qualys environment with customer business and security requirements

JAMF6 and 12 months quotes for deployment and management of workstations, setup and management of JAMF environment, documentation maintenanceAlign jamf/MDM environment with customer business and security requirements

Falcon Crowdstrike 6-12 months quote on Falcon Complete: Managed SOC (Incident Response) 6-12 months quote on LogScale 6-12 months quote on Spotlight 6-12 months quote on Falcon Azure

SolarWinds - Logging6-12 months quote on aligning environment with customer business and security requirements

Elastic SOC - SIEM6-12 months quote on aligning environment with customer business and security requirements

OKTA - MFA6-12 months quote on aligning environment with customer business and security requirements

  • ID: #49108450
  • State: Texas Dallas / fort worth 75202 Dallas / fort worth USA
  • City: Dallas / fort worth
  • Salary: $92
  • Job type: Contract
  • Showed: 2023-02-09
  • Deadline: 2023-04-04
  • Category: Et cetera